scholarly journals Security Analysis for CBTC Systems under Attack–Defense Confrontation

Electronics ◽  
2019 ◽  
Vol 8 (9) ◽  
pp. 991 ◽  
Author(s):  
Wenhao Wu ◽  
Bing Bu

Communication-based train controls (CBTC) systems play a major role in urban rail transportation. As CBTC systems are no longer isolated from the outside world but use other networks to increase efficiency and improve productivity, they are exposed to huge cyber threats. This paper proposes a generalized stochastic Petri net (GSPN) model to capture dynamic interaction between the attacker and the defender to evaluate the security of CBTC systems. Depending on the characteristics of the system and attack–defense methods, we divided our model into two phases: penetration and disruption. In each phase, we provided effective means of attack and corresponding defensive measures, and the system state was determined correspondingly. Additionally, a semiphysical simulation platform and game model were proposed to assist the GSPN model parameterization. With the steady-state probability of the system output from the model, we propose several indicators for assessing system security. Finally, we compared the security of the system with single defensive measures and multiple defensive measures. Our evaluations indicated the significance of the defensive measures and the seriousness of the system security situation.

2012 ◽  
Vol 253-255 ◽  
pp. 1803-1807
Author(s):  
Ka Ding Liu ◽  
Jing Cao ◽  
Jiang Hu

In recent years, urban rail transit construction asks for the safety of project with strict requests, because of its difficulty, high risk and complexity characteristics. Henggang metro depot possess double using garage , DC1500 contact rail system, and cover property on the top of the garage, thus it will face greater challenge in safety management. According to above characteristics, this research puts forward the system security goals, principles, and establishes a set of safeguard system, which includes three aspects: the legal laws and regulations, the organization construction, and the technical method. The safeguard system will play an important and guiding role in government standard formation and metro-property development mode promotion in other cities.


2021 ◽  
Vol 257 ◽  
pp. 01006
Author(s):  
Kaicheng Liu ◽  
Ying Guo ◽  
Dan Wang ◽  
Dezhi Li ◽  
Guixiong He

Regional integrated energy system (RIES) can realize multi-energy conversion and complementation so as to improve energy efficiency, which also brings more security risks. The regional integrated energy system security region (RIESSR) is a security analysis method to describe the safe area for the operating points of RIES based on the N-1 guideline. As a controllable device, energy storage (ES) which is installed in the energy hub (EH) plays an important role in improving system security. Therefore, this paper establishes the model of practical security region of RIES integrating energy storage, and studies the impact of ES on total supply capability (TSC) and practical security boundary. Finally, a specific case is set to simulate and verify the model. By comparing the scenario with ES and the scenario without ES, it can be seen that the solution result of TSC increases and the security region extends across quadrant when the RIES is integrated with ES system. The capacity and location of the ES also impact on TSC and RIESSR.


2021 ◽  
Vol 2021 ◽  
pp. 1-10
Author(s):  
Zenan Wu ◽  
Liqin Tian ◽  
Yi Zhang ◽  
Yan Wang ◽  
Yuquan Du

At present, most network security analysis theory assumes that the players are completely rational. However, this is not consistent with the actual situation. In this paper, based on the effectiveness constraints on both sides with network attack and defense, with the help of stochastic Petri net and evolutionary game theory, the Petri net model of network attack and defense stochastic evolutionary game is reconstructed, the specific definition of the model is given, and the modeling method is given through the network connection relationship and attack and defense strategy set. Using this model, a quantitative analysis of network attack events is carried out to solve a series of indicators related to system security, namely, attack success rate, average attack time, and average system repair time. Finally, the proposed model and analysis method are applied to a classic network attack and defense process for experimental analysis, and the results verify the rationality and accuracy of the model and analysis method.


Sign in / Sign up

Export Citation Format

Share Document